Sciweavers

190 search results - page 2 / 38
» A Wireless Security Framework without Shared Secrets
Sort
View
SECPERU
2006
IEEE
13 years 10 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 3 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....
INFOCOM
2010
IEEE
13 years 3 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
STORAGESS
2005
ACM
13 years 10 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 3 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel